Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Size: px
Start display at page:

Download "Acknowledged Broadcasting and Gossiping in ad hoc radio networks"

Transcription

1 Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, , Japan, 1 jiro@phaser.elcom.nitech.ac.jp, 3 wada@nitech.ac.jp 2 Tennessee State University 3500 John A MerritBlvd, Nashville, TN 37205, USA, 2 wchen@tnstate.edu Abstract. A radio network is a collection of transmitter-receiver devices (referred to as nodes). ARB (Acknowledged Radio Broadcasting) means transmitting a message from one special node called source to all the nodes and informing the source about its completion. In our model each node takes a synchronization per round and performs transmission or reception at one round. Each node does not have a collision detection capability and knows only own ID. In [1], it is proved that no ARB algorithm exists in the model without collision detection. In this paper, we show that if n 2, where n is the number of nodes in the network, we can construct algorithms which solve ARB in O(n) rounds for bidirectional graphs and in O(n 3/2 ) rounds for strongly connected graphs and solve ARG (Acknowledged Radio Gossiping) in O(n log 3 n) rounds for bidirectional graphs and in O(n 3/2 ) rounds for strongly connected graphs without collision detection. Key words: broadcasting, gossiping, distributed, deterministic, radio network 1 Introduction A radio network is a collection of transmitter-receiver devices (denoted as nodes). Each node can transmit data to the nodes that exist within its transmitting capability region. A radio network can be modeled by a directed graph (we simply call it graph) G =(V,E) called reachability graph, where V denotes a set of nodes and when a node u can transmit to a node v, there exists an edge (u, v) E. If(u, v) E, u is called an in-neighbor of v, and v is called an outneighbor of u. If the power of every transmitter is the same, then the reachability graph is bidirectional 4, that is, if there is an edge from node u to node v, then there exists the edge from v to u, and vice versa. We assume that all nodes in a radio network have access to a global clock (like GPS) and work synchronously in discrete time steps called rounds. At every round, each node transmits data or receives data. A node acting as a receiver in a given round gets a message iff exactly one of its in-neighbors transmits in 4 bidirectional is called symmetric in [1].

2 2 this round. If at least two in-neighbors v and v of u transmit simultaneously in a given round, none of the messages is received by u in this round. In this case we say that a conflict or a collision occurred at u. When collision occurs, two cases are considered: u notices the occurrence of a collision (i.e. it has collision detection), and u cannot distinguish between the background noise and the interference noise. It depends on the capability whether a node can detect a collision or not. One of the fundamental tasks in network communication is radio broadcasting (RB). Its goal is to transmit a message from one node of the network, called the source, to all other nodes. The message which is disseminated is called source message. Remote nodes get the source message via intermediate nodes, along directed paths in the network. In an acknowledged radio broadcasting (ARB) the goal is not only to achieve RB but also to inform the source about the completion of RB. This may be essential, e.g., when the source has several messages to disseminate, none of the nodes should receive the next message until all nodes get the previous one [1]. Another task is radio gossiping (RG) which broadcasts the message of each node to all other nodes. We also consider the task acknowledged radio gossiping (ARG) which achieves RG and inform every node about the completion of RG. In this paper, we consider the standard model of unknown radio networks, called the ad-hoc radio network model. We assume that each node does not know any information of the network (e.g. its neighbor, the number of nodes and the topology). The network is assumed to have a fix topology during the execution of algorithms. However, since no information of the network is used in our algorithms, they can be applied to networks with any topology. We evaluate algorithms with the number of rounds used to complete the tasks. 1.1 Previous results The standard collision-free communication procedure for ad hoc radio networks is called Round Robin [2]. Round Robin contains n rounds. In the i-th round the node with identifier i transmits its whole knowledge to all its out-neighbors. In every round at most one node acts as a transmitter, hence collisions are avoided. Round Robin is used as a subroutine in many RB and RG algorithms. An RG completes in O(n 2 ) rounds, where n is the number of nodes. There are two situations for communication procedures in radio networks: one is that nodes have full knowledge of the network (such as the topology of the network, the number of the nodes in the network, IDs of the neighbors etc.), the other is that nodes are ignorant of the network information. Various algorithms are studied in radio networks, e.g. the centralized algorithms with the mechanism in which all nodes are concentrated and managed, and the distributed algorithms without such a mechanism; the deterministic algorithms whose process become settled uniquely, and randomized algorithms which are not so [1 10]. Under the assumption that the nodes have full knowledge of the network, in [3] the authors proved the existence of a family of n-node networks of radius 2, for which any broadcast requires Ω(log 2 n) time, while in [4] it was proved

3 3 that broadcasting can be done in O(D + log 5 n) time, for any n-node network of diameter D. Hereafter, we assume that the nodes have neither the knowledge of the network nor the knowledge of their neighborhood. For randomized algorithms, the lower bound of Ω(D log(n/d)) for bidirectional graphs is shown by Kushilevitz and Mansour [6], and the lower bound of Ω(log 2 n) for constant diameter networks is obtained by Alon et al. [3]. For deterministic distributed algorithms, on the model without collision detection, Chlebus et al. have presented an optimal linear-time broadcasting protocol for bidirectional ad hoc radio networks [1]. Also, on the model with collision detection, they presented an O(n ecc)-time RB algorithm for strongly connected graphs, an O(r ecc)-time RB algorithm for arbitrary graphs, an O(n)-time ARB algorithm for bidirectional graphs, and an O(n ecc)-time ARB algorithm for strongly connected graphs, where ecc is the maximum distance from the source. Note that on the model without collision detection there does not exist any algorithm for ARB, even for bidirectional graphs [1]. The best O(n 1.5 ) time gossiping algorithm for strongly connected graphs is shown in [10]. About the lower bounds of deterministic RB, the lower bound of Ω(n) for bidirectional graphs [5] and the lower bound of Ω(n log n) for arbitrary graphs [9] are shown. Table 1 shows the results of these deterministic algorithms. Problem Collision detection Graphs Computation time RB without bidirectional O(n) [1] Ω(n) [5] arbitrary O(n log 2 n) [8] Ω(n log n) [9] with bidirectional O(r + ecc) [7] strongly connected O(n ecc) [1] arbitrary O(r ecc) [1] RG without strongly connected O(n 3/2 ) [10] ARB without bidirectional algorithm does not exist [1] with bidirectional O(n) [1] O(r + ecc) [7] strongly connected O(n ecc) [1] (n:number of nodes, ecc:largest distance from the source, r:length of the source message) Table 1. Previous results(deterministic and Distributed) 1.2 Our results In this paper, we consider the ARB and the ARG algorithms on the model of ad hoc radio networks without collision detection. As we mentioned on the model without collision detection, there does not exist any ARB algorithm even for bidirectional graphs [1], which is proved by using a special case: when the source

4 4 does not receive any message about the completion of the RB, the source can not distinguish between the situations that the network has only the source node (thus the source does not receive any message) and that at least two in-neighbors of the source transmit some messages (thus collision occurs). If we assume that the network contains at least one node other than the source node and each node knows the number of nodes or its in-neighbors, RB algorithms can be easily modified to ARB ones. It is interesting to know the weakest conditions needed for performing an ARB. In this paper, we show that if the network contains at least two nodes, we can construct algorithms which solve ARB for bidirectional graphs and strongly connected graphs under the assumption that the network has no collision detection and each node knows only its ID. The computation time of our ARB algorithm for bidirectional graphs is the same as the existing best RB algorithm which uses O(n) rounds. The computation time of our ARB algorithm for strongly connected graphs is O(6n + log n {2 RB(2 i )+RG(2 i )}), where RB(n) and RG(n) is the number of rounds which an RB and an RG requires for n-node strongly connected graphs, respectively. It becomes O(n 3/2 ) when using the O(n 3/2 )-time gossiping algorithm from [10]. In addition, we consider acknowledged radio gossiping (ARG) algorithms. We show that our ARB algorithms can be extended to ARG algorithms for both of bidirectional graphs and strongly connected graphs. Our ARB algorithm for bidirectional graphs needs a leader, and we use the source node to be the leader in the algorithm. In ARG, since no source node is given, we need to elect a leader for ARG when we extend the ARB algorithm to an ARG algorithm. For strongly connected graphs our ARB algorithm does not need a leader, therefore, in this case, the ARB algorithm can be extended to an ARG algorithm directly. The computation time of the extended ARG algorithms is O(n + log n {LE(2 i )}) for bidirectional graphs and O(6n + log n {RB(2 i )+2 RG(2 i )}) for strongly connected graphs, respectively, where LE(n) denotes the number of the rounds needed to elect a leader for n-node bidirectional graphs. The computation times of ARG algorithms become O(n log 3 n) and O(n 3/2 ), respectively, by using the O(n log 3 n)-time leader election algorithm from [8] and the O(n 3/2 )-time gossiping algorithm from [10]. 2 Model and Definitions In this paper, we consider the radio networks without a collision detection. We describe the model of radio networks we consider : The knowledge of every node is limited to its own ID. Each node knows whether itself is a source or not in broadcasting. Nodes in a radio network work per round synchronized by a global clock. In every round, each node acts either as a transmitter or as a receiver. A node acting as a receiver in a given round gets a message iff exactly one of its in-neighbors transmits in this round.

5 5 If more than one in-neighbor transmits simultaneously in a given round, collision occurs and none of the messages is received in this round. A node cannot notice the occurrence of a collision (i.e. without collision detection). For simplicity we assume that each node is labeled with distinct integers between 1 and n in an n-node network. But all the arguments hold if the labels are distinct integers between 1 and Z = O(n), and we do not use the property that the labels are in {1, 2,...,n}. 3 ARB and ARG in bidirectional graphs In this section, we describe ARB and ARG algorithms for bidirectional graphs where the number of nodes in the network is at least 2. First, we describe the overview of our algorithms, secondly we show an ARB algorithm and then modify it to an ARG algorithm. 3.1 Overview of our algorithm The main idea of our algorithm is that each node confirms all of its in-neighbors in every phase, where in the k-th phase nodes with ID at most 2 k works. In the k-th phase, first the in-neighbors of any node v whose IDs are no more than 2 k send their own IDs, thus the node v can recognize its in-neighbors IDs that are no more than 2 k. Then in the same phase the node whose ID is the minimum one among the in-neighbors with IDs no more than 2 k, and nodes whose IDs are more than 2 k send their IDs simultaneously. If the node v receives the minimum ID (i.e. collision does not occur), it recognizes that it knows all of the in-neighbor in this phase. It is easy to perform the ARB if every node knows all of its inneighbors. If the node v does not receive the minimum ID (i.e. collision occurs), v recognizes that it does not know all of the in-neighbors and the algorithm performs the next phase. 3.2 Algorithm bi-arb We show an ARB algorithm named bi-arb for bidirectional graphs in an n node radio network, where n 2. Algorithm bi-arb works phase by phase, numbered by consecutive positive integers. Phase k lasts 9 2 k 1 rounds divided into four stages. Stage A consists of 2 k 1 rounds, Stage B consists of 2 k rounds, Stage C consists of 2 k rounds, and Stage D consists of 2 k+1 rounds. We denote the ID of node v as ID(v). We define the following notations. L k : the set of nodes with IDs 1,..., and 2 k. G k : the connected component containing the source of the network induced by L k. G k = φ if the ID of the source node is larger than 2 k.

6 6 Nv k : the set of IDs smaller than or equal to 2 k from the in-neighbors of node v. min(nv k ) : the minimum ID in Nv k.ifnv k = φ, min(nv k )=. Note that in bidirectional graphs the in-neighbors of each node v are the same as the out-neighbors of v. Informally we show the algorithm of phase k. Stage A is a Round Robin which intends to let each node v know its in-neighbors (and out-neighbors) whose IDs are at most 2 k (Nv k ). In Stage B each node v in L k sends min(nv k ), which will be the only node in in-neighbors of v can transmit to v in the next stage C. Stage C is used to judge whether the node v of G k knows all of its in-neighbors or not. In Stage C the node whose ID is min(nv k ) and nodes not in L k send their IDs, then according to whether receiving min(nv k ) or not every node v in G k recognizes whether it knows all its in-neighbors or not. In Stage D the source node in G k broadcasts the source message to every node of G k. The stage also collects the information that whether each node in G k knows all its in-neighbors. Thereby the source node can confirm the completion of RB. We use the broadcast algorithm shown in [1] in this stage. bi-arb Phase 0 consists of one round, the node with ID 1 acts as transmitter and sends its ID in this phase. The other nodes act as receivers. Hereafter, we explain phase k>0, of bi-arb. We assume that every node is either a transmitter or a receiver in each round. Stage A. The rounds in Stage A of phase k are numbered by integers 2 k 1 + 1,...,2 k 1 +2 k 1. In round number i of Stage A only the node v with ID i acts as a transmitter and sends a message ID(v). Stage B. The rounds of this stage are numbered by integers 1,...,2 k. In round i of Stage B only the node v with ID i acts as a transmitter and sends a message min(nv k ). If min(nv k ) =, the node v sends no message. The node w that receives min(nv k) stores it if ID(w)=min(N v k). Stage C. The rounds in Stage C of phase k are numbered by integers 1,...,2 k. In round i of Stage C, the node v with ID i acts as a receiver. The node with ID=min(Nv k ) acts as transmitter and sends its ID (if min(nv k ) min()), and all the nodes whose IDs are larger than 2 k (not only in-neighbors of v) also send their own IDs in the round. Every node v not receiving min(nv k ) in the round ID(v), is set to the state warned which means that v does not know all its in-neighbors, or in other words, v has the in-neighbors whose IDs are larger than 2 k. Stage D. The rounds in Stage D of phase k are numbered by integers 1,...,2 k+1. The source initiates Stage D if its ID is less than or equal to 2 k. Otherwise all nodes do nothing in these 2 k+1 rounds. We use a message called token. At the beginning of this stage every node v G k knows its out-neighbor Nv k in G k and maintains a list Q v containing the set of its out-neighbors in G k which were not yet visited by the token. Q v is initialized to Nv k. When a warned node sends the token to an out-neighbor, it appends a warning message to the token, and the out-neighbor getting the token becomes warned.

7 7 When node v gets the token, it acts as follows: step1. Node v sends the message <ID(v), visited>. If a node u receives the message, it removes v from the list Q u. step2. Node v sends the token <source message, ID(w), (warning)> to the following node w: (i) If Q v = φ, w is the node from which v got the message in step1 for the first time. (ii) If Q v φ, w is the node with the smallest ID in the list Q v. the messages are concatenated and are sent in a single round. Node w which gets the token repeats the procedure of step 1 and step 2. If, at the end of phase k, the source is warned, it knows that the RB has not been completed, and shifts to the next phase. Otherwise the algorithm terminates. Correctness of Algorithm bi-arb Lemma 1. The following invariants are maintained after phase k of bi-arb, for any positive integer k. Every node v knows the N k v, the set of IDs at most 2 k from the in-neighbors(and out-neighbors) of v. Every node in G k knows the source message, if G k contains the source node. Proof. In phase k =0,G k contains only the source node if its ID equals 1, and Nv k = φ. Therefore, Lemma 1 holds obviously in this case. Assume that the invariants hold after phase k 1, k 1. We show that the invariants are maintained after phase k. In Stage A of phase k, the nodes whose IDs are between 2 k 1 and 2 k transmit their IDs. In every round, exact one node acts as a transmitter and the other nodes act as receivers, hence collisions are avoided. Any node v has already known Nv k 1 after phase k 1 from the assumption, v learns Nv k Nv k 1 the remaining neighbors in G k during phase k. In Stage D if G k contains the source node, the token is patrolled from the source node to all nodes in G k. At the beginning of Stage D the token is in the source node. It visits each node of G k from the source node in depth-first order. When node v got the token, it sends the token with the source message and its ID to its out-neighbors which have not received the token yet, following the Eulerian cycle C k of a spanning tree of G k as follows: Q v is the set of out-neighbors of v in G k which were not yet visited by the token. The node v that receives the token has to send the message <ID(v), visited> to its in-neighbors, node w that receives the message removes v from the list Q w.ifv has the neighbors which are not visited by the token, it passes the token to the one with the smallest ID. Else, v returns the token to the node from which it got the token for the first time. In Stage A every node v in G k knows its out-neighbors in G k, so the token patrols every node in G k and returns to the source finally.

8 transmit 1 4 transmit 10 transmit 1 Fig. 1. knowing all in-neighbors (k=3) Fig. 2. otherwise (k=3) Theorem 1. Algorithm bi-arb performs an ARB in time O(n), for any n-node bidirectional graph with n 2. Proof. Let l be such that 2 l 1 <n 2 l. It is sufficient to show that (1) After phase l all nodes of the network get the source message. (2) At the end of phase l the source does not warned. In order to prove (1) consider phase l. Since G l is the entire network, (1) follows from Lemma 1. The number of the rounds needed for this algorithm is at most l 9 2i l 18n. We prove (2). At the end of Stage A each node v knows Nv k. It sends min(nv k ) in round i=id(v) of Stage B. The node w receiving min(nv k ) memorizes the number of the round if ID(w)=min(Nv k ), otherwise ignores the message. Thereby in round i of Stage C only the node with ID i can act as transmitter. AnodeinG k recognizes whether it knows all its in-neighbors in Stage C. In round i of this stage for the node v with ID i, the node with ID=min(Nv k ) and the nodes with IDs larger than 2 k send their own IDs. Therefore the node v having in-neighbors with ID larger than 2 k cannot receive min(nv k ) in round ID(v) due to a collision. Then v recognizes that it does not know all in-neighbors, and becomes warned. Ifv knows all in-neighbors, it can receive min(nv k ) and will not become warned. Figure 1 shows the case where a node knows all inneighbors, and Figure 2 shows the other case in round 4 of phase 3, where the number of node represents its ID. Consider phase l. Since there is no node whose ID is larger than 2 l, each node v can receive min(nv k ) in the round ID(v) in Stage C. Therefore no node becomes warned in Stage D. Hence the source node is not warned at the end of phase l. Message size. Let S be the maximum length of the message transmitted each time and let r be the length of the source message. In Stage A,B and C each node transmits at most one ID respectively, thus S =O(log n). In Stage D each node transmits message <ID(v), visited> and the token <source message, ID(w), (warning)>, thus S = O(r + log n). Hence the maximum message size is at most O(r + log n) for algorithm bi-arb. 3.3 Algorithm bi-arg The ARG algorithm bi-arg for bidirectional graphs is obtained by changing a part of bi-arb.

9 9 Algorithm bi-arg works in phases, numbered by consecutive positive integers similar to bi-arb. Each phase consists of four stages A,B,C and D. Stage A,B,C are the same as these of algorithm bi-arb but Stage D is different. It needs a leader election procedure and an extra token patrolling. Recall that in bi-arb, the source node is used to be the starting point of the token patrolling. Furthermore, each node knows whether itself is a source or not. But the source node does not exist for ARG. We have to elect one leader for each connected component induced by L k so that the token patrolling can be performed in each component. We use a leader election procedure. The leader of each connected component acts as initiator and makes the token patrol twice in its connected component in Stage D. In the first patrol the leader of each connected component collects the messages which each node has and warning messages from the nodes to the leader (the same as that in bi-arb), then in the second patrol it disseminates the messages which were collected in the first patrol to all the nodes in the component. Thereby any node knows whether RG have completed or not. In order to use an leader election algorithm, each node must know the completion time of the algorithm, since the leader election procedure must finish in each phase of bi-arg. Theorem 2. Algorithm bi-arg performs an ARG in time O(n+ log n {LE(2 i )}), for any bidirectional graph with n 2, where LE(k) denotes the number of the rounds of any leader election algorithm for k-node bidirectional graphs in which each node knows the completion time. We use the algorithm FIND MAX shown in [8] as a leader election procedure. The algorithm FIND MAX elects a leader by calculating the maximum ID on a strongly connected graph under the assumption that each node knows the upper bound of IDs of nodes in the network. Moreover, if each node knows (the upper bound of) the number of nodes n in the network, it can compute the completion time of FIND MAX, which is cn log 3 n for some known constant c. Algorithm FIND MAX finds the leader based on binary search. At each step, all nodes know that the minimum ID (the node having this ID is elected as a leader) among all nodes is between a and b by broadcasting a message, where a b. Initially a =0 and b = n. Ifa = b, then the minimum ID is equal to a, and the computation of minimum ID is complete. In each phase we use this algorithm to elect a leader for each connected component. In phase k, the upper bound of IDs and that of the number of nodes in the connected components induced by L k is known to be 2 k. We obtain the following corollary from Theorem 2 using the O(n log 3 n)-time leader election algorithm FIND MAX. Corollary 1. Algorithm bi-arg performs ARG in time O(n log 3 n), for any bidirectional graph with n 2. log n 2 i log 3 2 i 2(2 log n 1) (log n +1) 3 2(2n 2) (log n +1) 3

10 10 Our algorithm bi-arg is improvable if more efficient leader election algorithms can be designed for bidirectional graphs under the condition that each node knows the maximum of IDs and n. Message size. Let S be the maximum length of the message transmitted each time and let r be the length of the message each node has. In Stage A,B and C, S =O(log n) which are the same as that of bi-arb. In Stage D first S =O(log n) for the leader election procedure FIND MAX [8]. Next each node adds its own message to the token, S =O(rn + log n). Hence the maximum message size is at most O(rn + log n) for algorithm bi-arg. 4 ARB and ARG in strongly connected graphs 4.1 Algorithm st-arb The ARB algorithm st-arb for strongly connected graphs is obtained by changing a part of bi-arb. Algorithm st-arb works in phases, numbered by consecutive positive integers. Every phase starts in the round following the end of the previous phase. Phase k(> 0) lasts 3 2 k 1 +2 RB(2 k )+RG(2 k ) rounds divided into four stages. Stage A consists of 2 k 1 rounds, Stage B consists of RG(2 k ) rounds, Stage C consists of 2 k rounds, and Stage D consists of 2 RB(2 k ) rounds. Here we show the outline of this algorithm in phase k. Stage A and C of st-arb are the same as those of bi-arb, and the purpose of Stage B and D also does not change. Although in bidirectional graphs a node v can transmit min(nv k) to its in-neighbor w whose ID=min(N v k ) because the in-neighbors of v is also its out-neighbors, node v cannot do that in strongly connected graphs since w may not be an out-neighbor of v. To do this, v must gossipon the subgraph induced by L k in Stage B. In Stage D each node other than the source node in L k transmits the warning message and the source node broadcasts the source message. Thereby the source node can confirm the completion of RB. In st-arb we use the RB and RG in the subgraph induced by L k (not necessarily strongly connected). In order to apply the RB algorithm for strongly connected graphs to our algorithm, it is sufficient to perform the task for all reachable nodes. About RG algorithm, it is not necessary to perform the task for all reachable nodes. Any algorithm of RB and RG can be applied to our algorithm if each node knows the completion time. We consider an extension of the RB that broadcasts from several source nodes with the same messages to all reachable nodes, and use the algorithm that performs such an extended RB in Stage D. Since the algorithm does not depend on the information of the source node, it can perform an RB in the situation such that several source nodes exist. st-arb Phase 0 consists of one round, the node with ID 1 acts as transmitter and sends its ID in this phase. The other nodes act as receivers. Hereafter, we explain phase k(> 0) of st-arb. Stage A and C is the same as that of bi-arb. Every node that is not transmitter is receiver in the explanation.

11 11 Stage A. Rounds in Stage A of phase k are numbered by integers 2 k 1 + 1,...,2 k 1 +2 k 1. In round number i of Stage A the only node v with ID i acts as a transmitter and sends a message ID(v). Stage B. Stage B consists of RG(2 k ) rounds. In Stage B each node v in L k acts as a transmitter, gossiping the message <ID(v), min(n k v)>. If min(nv k )=λ, the node v sends no message. Stage C. Rounds in Stage C of phase k are numbered by integers 1,...,2 k.in round number i of Stage C the node v with ID i acts as a receiver. The node with ID min(nv k ) and the nodes whose IDs are larger than 2 k act as transmitter, sending their own IDs. Every node v not receiving min(nv k ) in the round ID(v), is set to the state warned. Stage D. Stage D consists of 2 RB(2 k ) rounds. First, each node sends a warning message if it is warned. Next, if the source does not receive the warning message, it knows that there is no node in L k whose in-neighbors with ID> 2 k and then broadcasts the source message, otherwise it knows that there still exist nodes in L k whose in-neighbors with ID> 2 k and then it becomes warned, and shifts to the next phase. Correctness of Algorithm st-arb Lemma 2. If there are warned nodes in the strongly connected graph after phase k of st-arg then there is a path from at least one warned node to the source node that contains only nodes whose IDs are not larger than 2 k. Proof. Let v be some warned node. In the original graph there is a path from v to the source. If there are nodes with ID> 2 k in this path, let the out-neighbor of the last of them in the path be v. The path from v to the source proves the lemma. Theorem 3. Algorithm st-arb performs ARB in time O(6n + log n {2 RB(2 i )+RG(2 i )}), in any strongly connected graphs with n nodes, where n 2 and RB(k) and RG(k) denotes the number of the rounds of any extended RB and RG algorithm for k-node strongly connected graphs in which each node knows the completion time, respectively. Proof. Let l be such that 2 l 1 <n 2 l. It is enough to show that (1) After phase l all nodes of the network get the source message. (2) At the end of phase l the source node does not warned. In order to prove (1) consider phase l. Since L l is the entire network, each node considers the upper bound of the number of nodes is 2 l and does broadcasting, then every node gets the source message. The completion time of this algorithm is at most l {3 2 i 1 +2 RB(2 i )+RG(2 i )} 6n + log n {2 RB(2 i )+RG(2 i )}

12 12 We prove (2). Since Stage A is the same as that of bi-arb for phase k, any node v knows Nv k in the stage. In Stage B each node v in L k gossips <ID(v), min(n k v )>. If the gossiping are performed correctly, in Stage C only one node in Nv k can act as transmitter. If L k does not contain all nodes of the graph, the induced subgraph by L k is not necessarily strongly connected and the gossiping of all messages is not secured. But L l contains all node in the graph, all messages are gossiped correctly. Stage C is also the same as that of bi-arb, each node v recognizes whether it knows all its in-neighbors. Similar to bi-arb the node v having in-neighbors with ID larger than 2 k cannot receive min(nv k ) in round ID(v). The node v which could not receive min(nv k ) recognizes that it does not know all in-neighbor, and becomes warned. If there is no node with ID> 2 k in the graph, all messages are gossiped in Stage B. It means that v can receive min(nv k ) in Stage C and does not become warned. In Stage D each node confirms whether it receives the warning message or not, and the source node sends the source message. From Lemma 2 if there exists at least one warned node, its warning message reaches the source node. Then the source node knows that there exist the nodes in the graph with ID> 2 k. Consider phase l, since there is no node in the graph with ID> 2 l, each message of any node is gossiped to all nodes in Stage B correctly. Therefore any node does not become warned in Stage C. Hence, the source node confirms the completion of RB and is not warned at the end of phase l since L l is the entire network and there is no warned node in the graph. We obtain the following corollary from Theorem 3 using the O(n log 2 n)- time broadcasting algorithm from [8] and the O(n 3/2 )-time gossiping algorithm from [10]. The broadcasting Algorithm from [8] can perform the extended RB. The algorithm consists of stages, with each stage having log n +1=O(log n) steps. For each j =0,...,log n let S j =(S j,0,s j,1,...,s j,mj 1) bea2 j -selector with m j = O(2 j log n) sets, and the transmission set at the jth stepof stage s is S j, s mod mj, where w-selector is defined as follow; Given a positive integer w, a family S of sets is called a w-selector if it satisfies the following property: For any two disjoint sets X, Y {1,...,n} with w/2 X w and Y w there exists a set in S such that S X = 1 and S X = φ. Since each node does not use the information whether it is the source or not and does not depend on the message it received in the previous round, RB can be done on condition that several source nodes have the same message. Each node can compute the completion time of each algorithm under the assumption that it knows the upper bound of IDs of nodes in the network. Corollary 2. Algorithm st-arb performs ARB in time O(n 3/2 ), for any strongly connected graphs with n 2. Message size. Let S be the maximum length of the message transmitted each time and let r be the length of the source message. In Stage A and C each node transmits at most one ID, thus S = O(log n). In Stage B each node v gossips ID(v)

13 13 and min(n k v ), thus S = O(n log n). In Stage D each node transmits a warning message, the source node transmits the source message, thus S = O(r). Hence the maximum message size is at most O(r + n log n) for algorithm st-arb. 4.2 Algorithm st-arg The ARG algorithm st-arg for strongly connected graphs is obtained by changing a part of st-arb. Algorithm st-arg works in phases, numbered by consecutive positive integers as well as st-arb. Stage A,B and C is the same as that of st-arb. We perform ARG by changing Stage D. Stage D consists of RB(2 k )+RG(2 k ) rounds. First stepwhere each node confirms whether it receives the warning message or not is the same as that of Stage D of st-arb. If a node does not receive warning message, it knows that there is no node with ID> 2 k and gossipits own message, otherwise it knows that there still exist nodes with ID> 2 k and becomes warned, then shifts to the next phase. Theorem 4. Algorithm st-arg performs ARG in time O(6n+ log n {RB(2 i )+ 2 RG(2 i )}), for any strongly connected graph with n nodes, where n 2 and RB(k) and RG(k) denotes the number of the rounds of any RB and RG algorithm for k-node strongly connected graphs in which each node knows the completion time, respectively. We obtain the following corollary from Theorem 4 using the O(n log 2 n)- time broadcasting algorithm from [8] and the O(n 3/2 )-time gossiping algorithm from [10] as well as Corollary 2. Corollary 3. Algorithm st-arg performs ARG in time O(n 3/2 ), for any strongly connected graph with n nodes, where n 2. Message size. Let S be the maximum length of the message transmitted each time and let r be the length of the message each node has. In Stage A,B and C S =O(n log n) is the same as that of st-arb. In Stage D each node v broadcasts a warning message and gossips its own message, thus S = O(rn). Hence the maximum message size is at most O(rn + n log n) for algorithm st-arg. 5 Conclusion In this paper, on the model without collision detection we show that we can construct deterministic and distributed ARB algorithms for symmetric digraphs in time O(n), and for strongly connected digraphs in time O(6n + log n {2 RB(2 i )+RG(2 i )}), where n is the number of the nodes in the graphs and n 2. We also show that our each ARB algorithm can be extended to ARG algorithm. Our algorithms can be improved if we can find more efficient leader election algorithms for symmetric digraphs and if ARB can be achieved without using RG for strongly connected digraphs.

14 14 References 1. B.S. Chlebus, L. G asieniec, A.M. Gibbons, A. Pelc, and W. Rytter. Deterministic broadcasting in ad hoc radio networks. Distributed Computing 15, pages 27 38, L.G asieniec, M.Christersson and A.Lingas. Gossiping with bounded size messages in ad hoc radio networks. 29th International Colloquium on Automata, Languages and Programming, (ICALP 02), pages , N.Alon,, A.Bar-Noy, N.Linial, and D.Peleg. A lower bound for radio broadcast. Journal of Computer and System Sciences 43, pages , I.Gaber and Y.Mansour. Broadcast in Radio Networks. 6th Ann. ACM-SIAM Symp. on Discrete Algorithms, SODA 95, pages , R.Bar-Yehuda, O.Goldreich, and A.Itai. On the time-complexity of broadcast in radio networks: an exponential gap between determinism and randomization, 6th ACM Symposium on Principles of Distributed Computing, pages , E.Kushilevitz and Y.Mansour. An Ω D log n D lower bound for broadcast in radio networks. 12th Ann. ACM Symp. on Principles of Distributed Computing, 65 73, T.Okuwa, W.Chen and K.Wada. An optimal algorithm of acknowledged broadcasting in ad hoc networks, Proc. of 2nd Int l Symp. Parallel and Distributed Computing(2003)(to appear). 8. M.Chrobak, L.G asieniec, and W.Rytter. Fast broadcasting and gossiping in radio networks. st IEEE Symp. on Found. of Computer Science (FOCS 2000), pages , D.Brusci and M.Del Pinto. Lower bounds for the broadcast problem in mobile radio networks. Distributed Computing 10, pages , Y.Xu. An O(n 1.5 ) deterministic gossiping algorithm for radio networks. Algorithmica, May 2003, pages 93 96, 2003.

arxiv: v1 [cs.dc] 9 Oct 2017

arxiv: v1 [cs.dc] 9 Oct 2017 Constant-Length Labeling Schemes for Deterministic Radio Broadcast Faith Ellen Barun Gorain Avery Miller Andrzej Pelc July 11, 2017 arxiv:1710.03178v1 [cs.dc] 9 Oct 2017 Abstract Broadcast is one of the

More information

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able

More information

c 2004 Society for Industrial and Applied Mathematics

c 2004 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 18, No. 2, pp. 332 346 c 2004 Society for Industrial and Applied Mathematics FASTER DETERMINISTIC BROADCASTING IN AD HOC RADIO NETWORKS DARIUSZ R. KOWALSKI AND ANDRZEJ PELC

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

A Randomized Algorithm for Gossiping in Radio Networks

A Randomized Algorithm for Gossiping in Radio Networks A Randomized Algorithm for Gossiping in Radio Networks Marek Chrobak Department of Computer Science, University of California, Riverside, California 92521 Leszek Ga sieniec Department of Computer Science,

More information

TIME OF DETERMINISTIC BROADCASTING IN RADIO NETWORKS WITH LOCAL KNOWLEDGE

TIME OF DETERMINISTIC BROADCASTING IN RADIO NETWORKS WITH LOCAL KNOWLEDGE SIAM J. COMPUT. Vol. 33, No. 4, pp. 87 891 c 24 Society for Industrial and Applied Mathematics TIME OF DETERMINISTIC BROADCASTING IN RADIO NETWORKS WITH LOCAL KNOWLEDGE DARIUSZ R. KOWALSKI AND ANDRZEJ

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

Network-Wide Broadcast

Network-Wide Broadcast Massachusetts Institute of Technology Lecture 10 6.895: Advanced Distributed Algorithms March 15, 2006 Professor Nancy Lynch Network-Wide Broadcast These notes cover the first of two lectures given on

More information

Rumors Across Radio, Wireless, and Telephone

Rumors Across Radio, Wireless, and Telephone Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu

More information

Time-Optimal Information Exchange on Multiple Channels

Time-Optimal Information Exchange on Multiple Channels Time-Optimal Information Exchange on Multiple Channels Stephan Holzer 1, Yvonne-Anne Pignolet 2, Jasmin Smula 1, Roger Wattenhofer 1 1 Computer Eng. and Networks Laboratory (TIK), ETH Zurich, Switzerland

More information

Sensor Network Gossiping or How to Break the Broadcast Lower Bound

Sensor Network Gossiping or How to Break the Broadcast Lower Bound Sensor Network Gossiping or How to Break the Broadcast Lower Bound Martín Farach-Colton 1 Miguel A. Mosteiro 1,2 1 Department of Computer Science Rutgers University 2 LADyR (Distributed Algorithms and

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes

An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes An Optimal (d 1)-Fault-Tolerant All-to-All Broadcasting Scheme for d-dimensional Hypercubes Siu-Cheung Chau Dept. of Physics and Computing, Wilfrid Laurier University, Waterloo, Ontario, Canada, N2L 3C5

More information

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical

MAC Theory Chapter 7. Standby Energy [digitalstrom.org] Rating. Overview. No apps Mission critical Standby Energy [digitalstrom.org] MAC Theory Chapter 7 0 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy lost Make electricity smart cheap networking (over

More information

MAC Theory. Chapter 7

MAC Theory. Chapter 7 MAC Theory Chapter 7 Ad Hoc and Sensor Networks Roger Wattenhofer 7/1 Standby Energy [digitalstrom.org] 10 billion electrical devices in Europe 9.5 billion are not networked 6 billion euro per year energy

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Token Traversal in Ad Hoc Wireless Networks via Implicit Carrier Sensing

Token Traversal in Ad Hoc Wireless Networks via Implicit Carrier Sensing Token Traversal in Ad Hoc Wireless Networks via Implicit Carrier Sensing Tomasz Jurdziński 1, Michał Różański 1, and Grzegorz Stachowiak 1 1 Institute of Computer Science, University of Wrocław, Poland.

More information

Broadcast in the Ad Hoc SINR Model

Broadcast in the Ad Hoc SINR Model Broadcast in the Ad Hoc SINR Model Sebastian Daum 1,, Seth Gilbert 3, Fabian Kuhn 1, and Calvin Newport 2 1 Department of Computer Science, University of Freiburg, Germany {sdaum,kuhn}@cs.uni-freiburg.de

More information

Randomized broadcast in radio networks with collision detection

Randomized broadcast in radio networks with collision detection Randomized broadcast in radio networks with collision detection The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published

More information

INFORMATION EXCHANGE WITH COLLISION DETECTION ON MULTIPLE CHANNELS

INFORMATION EXCHANGE WITH COLLISION DETECTION ON MULTIPLE CHANNELS *Manuscript Click here to download Manuscript: jco.pdf Click here to view linked References 1 1 1 1 1 1 0 1 0 1 0 1 INORMATION EXCHANGE WITH COLLISION DETECTION ON MULTIPLE CHANNELS Yuepeng Wang 1, Yuexuan

More information

Efficient Symmetry Breaking in Multi-Channel Radio Networks

Efficient Symmetry Breaking in Multi-Channel Radio Networks Efficient Symmetry Breaking in Multi-Channel Radio Networks Sebastian Daum 1,, Fabian Kuhn 2, and Calvin Newport 3 1 Faculty of Informatics, University of Lugano, Switzerland sebastian.daum@usi.ch 2 Department

More information

Monitoring Churn in Wireless Networks

Monitoring Churn in Wireless Networks Monitoring Churn in Wireless Networks Stephan Holzer 1 Yvonne-Anne Pignolet 2 Jasmin Smula 1 Roger Wattenhofer 1 {stholzer, smulaj, wattenhofer}@tik.ee.ethz.ch, yvonne-anne.pignolet@ch.abb.com 1 Computer

More information

Fast Sorting and Pattern-Avoiding Permutations

Fast Sorting and Pattern-Avoiding Permutations Fast Sorting and Pattern-Avoiding Permutations David Arthur Stanford University darthur@cs.stanford.edu Abstract We say a permutation π avoids a pattern σ if no length σ subsequence of π is ordered in

More information

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization Reuven Bar-Yehuda Oded Goldreich Alon Itai Department of Computer Science Technion

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

1.6 Congruence Modulo m

1.6 Congruence Modulo m 1.6 Congruence Modulo m 47 5. Let a, b 2 N and p be a prime. Prove for all natural numbers n 1, if p n (ab) and p - a, then p n b. 6. In the proof of Theorem 1.5.6 it was stated that if n is a prime number

More information

Enumeration of Two Particular Sets of Minimal Permutations

Enumeration of Two Particular Sets of Minimal Permutations 3 47 6 3 Journal of Integer Sequences, Vol. 8 (05), Article 5.0. Enumeration of Two Particular Sets of Minimal Permutations Stefano Bilotta, Elisabetta Grazzini, and Elisa Pergola Dipartimento di Matematica

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Tight Bounds for Scattered Black Hole Search in a Ring

Tight Bounds for Scattered Black Hole Search in a Ring Tight Bounds for Scattered Black Hole Search in a Ring Jérémie Chalopin 1, Shantanu Das 1, Arnaud Labourel 1, and Euripides Markou 2 1 LIF, CNRS & Aix-Marseille University, Marseille, France. {jeremie.chalopin,shantanu.das,arnaud.labourel}@lif.univ-mrs.fr

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

Deterministic Symmetric Rendezvous with Tokens in a Synchronous Torus

Deterministic Symmetric Rendezvous with Tokens in a Synchronous Torus Deterministic Symmetric Rendezvous with Tokens in a Synchronous Torus Evangelos Kranakis 1,, Danny Krizanc 2, and Euripides Markou 3, 1 School of Computer Science, Carleton University, Ottawa, Ontario,

More information

Randomized Broadcast in Radio Networks with Collision Detection

Randomized Broadcast in Radio Networks with Collision Detection Randomized Broadcast in Radio Networks with Collision Detection Mohsen Ghaffari ghaffari@mit.edu MIT Bernhard Haeupler haeupler@mit.edu MIT Majid Khabbazian mkhabbazian@ualberta.ca University of Alberta

More information

Algorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014

Algorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014 Algorithms and Data Structures: Network Flows 24th & 28th Oct, 2014 ADS: lects & 11 slide 1 24th & 28th Oct, 2014 Definition 1 A flow network consists of A directed graph G = (V, E). Flow Networks A capacity

More information

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks 1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,

More information

PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks

PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks Guobao Sun, Fan Wu, Xiaofeng Gao, and Guihai Chen Shanghai Key Laboratory of Scalable Computing and Systems Department

More information

Foundations of Distributed Systems: Tree Algorithms

Foundations of Distributed Systems: Tree Algorithms Foundations of Distributed Systems: Tree Algorithms Stefan Schmid @ T-Labs, 2011 Broadcast Why trees? E.g., efficient broadcast, aggregation, routing,... Important trees? E.g., breadth-first trees, minimal

More information

Clock Synchronization

Clock Synchronization Clock Synchronization Chapter 9 d Hoc and Sensor Networks Roger Wattenhofer 9/1 coustic Detection (Shooter Detection) Sound travels much slower than radio signal (331 m/s) This allows for quite accurate

More information

Problem Set 10 Solutions

Problem Set 10 Solutions Design and Analysis of Algorithms May 8, 2015 Massachusetts Institute of Technology 6.046J/18.410J Profs. Erik Demaine, Srini Devadas, and Nancy Lynch Problem Set 10 Solutions Problem Set 10 Solutions

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Consensus and Mutual Exclusion in a Multiple Access Channel

Consensus and Mutual Exclusion in a Multiple Access Channel Consensus and Mutual Exclusion in a Multiple Access Channel Jurek Czyzowicz 1,, Leszek Gasieniec 2,, Dariusz R. Kowalski 2,, and Andrzej Pelc 1, 1 Département d informatique, Université duquébec en Outaouais,

More information

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.

More information

Ring exploration by a team of asynchronous oblivious robots

Ring exploration by a team of asynchronous oblivious robots Ring exploration by a team of asynchronous oblivious robots Paola Flocchini David Ilcinkas Andrzej Pelc Nicola Santoro Abstract We consider the problem of exploring an anonymous unoriented ring by a team

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference

Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference Topology Control with Better Radio Models: Implications for Energy and Multi-Hop Interference Douglas M. Blough Mauro Leoncini Giovanni Resta Paolo Santi June 1, 2006 Abstract Topology Control (TC) is

More information

Inputs. Outputs. Outputs. Inputs. Outputs. Inputs

Inputs. Outputs. Outputs. Inputs. Outputs. Inputs Permutation Admissibility in Shue-Exchange Networks with Arbitrary Number of Stages Nabanita Das Bhargab B. Bhattacharya Rekha Menon Indian Statistical Institute Calcutta, India ndas@isical.ac.in Sergei

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random Generating Pseudo-Random Permutations and Maimum Flow Algorithms Noga Alon IBM Almaden Research Center, 650 Harry Road, San Jose, CA 9510,USA and Sackler Faculty of Eact Sciences, Tel Aviv University,

More information

Capacity of Two-Way Linear Deterministic Diamond Channel

Capacity of Two-Way Linear Deterministic Diamond Channel Capacity of Two-Way Linear Deterministic Diamond Channel Mehdi Ashraphijuo Columbia University Email: mehdi@ee.columbia.edu Vaneet Aggarwal Purdue University Email: vaneet@purdue.edu Xiaodong Wang Columbia

More information

Greedy Flipping of Pancakes and Burnt Pancakes

Greedy Flipping of Pancakes and Burnt Pancakes Greedy Flipping of Pancakes and Burnt Pancakes Joe Sawada a, Aaron Williams b a School of Computer Science, University of Guelph, Canada. Research supported by NSERC. b Department of Mathematics and Statistics,

More information

TWO-WAY communication between two nodes was first

TWO-WAY communication between two nodes was first 6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015 On the Capacity Regions of Two-Way Diamond Channels Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow,

More information

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property

Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property Minimum Power Assignment in Wireless Ad Hoc Networks with Spanner Property Yu Wang (ywang32@unnc.edu) Department of Computer Science, University of North Carolina at Charlotte Xiang-Yang Li (xli@cs.iit.edu)

More information

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks

A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks A Jamming-Resistant MAC Protocol for Single-Hop Wireless Networks Baruch Awerbuch Dept. of Computer Science Johns Hopkins University Baltimore, MD 21218, USA baruch@cs.jhu.edu Andrea Richa Dept. of Computer

More information

Radio Aggregation Scheduling

Radio Aggregation Scheduling Radio Aggregation Scheduling ALGOSENSORS 2015 Rajiv Gandhi, Magnús M. Halldórsson, Christian Konrad, Guy Kortsarz, Hoon Oh 18.09.2015 Aggregation Scheduling in Radio Networks Goal: Convergecast, all nodes

More information

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks

Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks The InsTITuTe for systems research Isr TechnIcal report 2009-9 Distributed Pruning Methods for Stable Topology Information Dissemination in Ad Hoc Networks Kiran Somasundaram Isr develops, applies and

More information

Analysis of Power Assignment in Radio Networks with Two Power Levels

Analysis of Power Assignment in Radio Networks with Two Power Levels Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two

More information

The Complexity of Connectivity in Wireless Networks

The Complexity of Connectivity in Wireless Networks The Complexity of Connectivity in Wireless Networks Thomas Moscibroda Computer Engineering and Networks Laboratory ETH Zurich, Switzerland moscitho@tik.ee.ethz.ch Roger Wattenhofer Computer Engineering

More information

Pattern Avoidance in Poset Permutations

Pattern Avoidance in Poset Permutations Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions

More information

Scattered Black Hole Search in an Oriented Ring using Tokens

Scattered Black Hole Search in an Oriented Ring using Tokens Scattered Black Hole Search in an Oriented Ring using Tokens Stefan Dobrev, Nicola Santoro, WeiSHI University of Ottawa Carleton University School of Information Technology and Engineering School of Computer

More information

Localized Topology Control for Unicast and Broadcast in Wireless Ad Hoc Networks

Localized Topology Control for Unicast and Broadcast in Wireless Ad Hoc Networks 1 Localized Topology Control for Unicast and Broadcast in Wireless Ad Hoc Networks Wen-Zhan Song Xiang-Yang Li Ophir Frieder WeiZhao Wang Department of Computer Science, Illinois Institute of Technology,

More information

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Lixin Wang, Peng-Jun Wan, and Kyle Young Department of Mathematics, Sciences and Technology, Paine College, Augusta, GA 30901,

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1 Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission

Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Asymptotically Optimal Two-Round Perfectly Secure Message Transmission Saurabh Agarwal 1, Ronald Cramer 2 and Robbert de Haan 3 1 Basic Research in Computer Science (http://www.brics.dk), funded by Danish

More information

Message Passing in Distributed Wireless Networks

Message Passing in Distributed Wireless Networks Message Passing in Distributed Wireless Networks Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08540. vaggarwa @princeton.edu Youjian Liu Department of ECEE,

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Self-Stabilizing Deterministic TDMA for Sensor Networks

Self-Stabilizing Deterministic TDMA for Sensor Networks Self-Stabilizing Deterministic TDMA for Sensor Networks Mahesh Arumugam Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State

More information

Approximation algorithm for data broadcasting in duty cycled multi-hop wireless networks

Approximation algorithm for data broadcasting in duty cycled multi-hop wireless networks University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Approximation algorithm for data broadcasting

More information

Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks

Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks Efficient Information Exchange in Single-Hop Multi-Channel Radio Networks Weijie Shi 1, Qiang-Sheng Hua 1, Dongxiao Yu 2, Yuexuan Wang 1, and Francis C.M. Lau 2 1 Institute for Theoretical Computer Science,

More information

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks

Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Minimum-Latency Schedulings for Group Communications in Multi-channel Multihop Wireless Networks Peng-Jun Wan 1,ZhuWang 1,ZhiyuanWan 2,ScottC.-H.Huang 2,andHaiLiu 3 1 Illinois Institute of Technology,

More information

PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks

PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks Globecom 212 - Ad Hoc and Sensor Networking Symposium PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks Guobao Sun, Fan Wu, Xiaofeng Gao, and Guihai Chen Shanghai

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

arxiv: v1 [cs.cc] 21 Jun 2017

arxiv: v1 [cs.cc] 21 Jun 2017 Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik

More information

Permutations and codes:

Permutations and codes: Hamming distance Permutations and codes: Polynomials, bases, and covering radius Peter J. Cameron Queen Mary, University of London p.j.cameron@qmw.ac.uk International Conference on Graph Theory Bled, 22

More information

Generic Attacks on Feistel Schemes

Generic Attacks on Feistel Schemes Generic Attacks on Feistel Schemes Jacques Patarin 1, 1 CP8 Crypto Lab, SchlumbergerSema, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France PRiSM, University of Versailles, 45 av. des

More information

Exploring an unknown dangerous graph with a constant number of tokens

Exploring an unknown dangerous graph with a constant number of tokens Exploring an unknown dangerous graph with a constant number of tokens B. Balamohan e, S. Dobrev f, P. Flocchini e, N. Santoro h a School of Electrical Engineering and Computer Science, University of Ottawa,

More information

18.204: CHIP FIRING GAMES

18.204: CHIP FIRING GAMES 18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on

More information

Online Call Control in Cellular Networks Revisited

Online Call Control in Cellular Networks Revisited Online Call Control in Cellular Networks Revisited Yong Zhang Francis Y.L. Chin Hing-Fung Ting Joseph Wun-Tat Chan Xin Han Ka-Cheong Lam Abstract Wireless Communication Networks based on Frequency Division

More information

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian

More information

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science

More information

Tile Complexity of Assembly of Length N Arrays and N x N Squares. by John Reif and Harish Chandran

Tile Complexity of Assembly of Length N Arrays and N x N Squares. by John Reif and Harish Chandran Tile Complexity of Assembly of Length N Arrays and N x N Squares by John Reif and Harish Chandran Wang Tilings Hao Wang, 1961: Proving theorems by Pattern Recognition II Class of formal systems Modeled

More information

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.

More information

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Broadcast in Radio Networks in the presence of Byzantine Adversaries Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees. 7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}

More information

On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks

On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks Randall Berry Dept. of ECE Northwestern Univ. Evanston, IL 60208, USA e-mail: rberry@ece.northwestern.edu Eytan Modiano

More information

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

MULTI-HOP wireless networks consist of nodes with a

MULTI-HOP wireless networks consist of nodes with a IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Minimum Latency Broadcast Scheduling in Duty-Cycled Multi-Hop Wireless Networks Xianlong Jiao, Student Member, IEEE, Wei Lou, Member, IEEE, Junchao

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Interference-Resilient Information Exchange

Interference-Resilient Information Exchange Interference-Resilient Information Exchange The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Gilbert,

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Permutation Groups. Every permutation can be written as a product of disjoint cycles. This factorization is unique up to the order of the factors.

Permutation Groups. Every permutation can be written as a product of disjoint cycles. This factorization is unique up to the order of the factors. Permutation Groups 5-9-2013 A permutation of a set X is a bijective function σ : X X The set of permutations S X of a set X forms a group under function composition The group of permutations of {1,2,,n}

More information